{"uuid": "9efa8d2f-10ac-49e6-bd84-e4f54d885016", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-23017", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/835", "content": "Updates On Hackbyte Forum:-\n\n\ud83d\udcccBianLian \u2013 Ransomware\n\ud83d\udcccPoC for CVE-2022-34265 (Django)\n\ud83d\udcccFUGIO - Automatic Exploit Generation for PHP Object Injection Vulnerabilities\n\ud83d\udcccRCE and Domain Admin privilege escalation for Mailcow\n\ud83d\udcccFTP-Inspector\n\ud83d\udcccCVE-2022-24934\n\ud83d\udcccOctopusWAF\n\ud83d\udcccVernet - Network Analyzer and Monitoring Tool\n\ud83d\udcccUAParser.js\n\ud83d\udcccJSshell\n\ud83d\udcccSXSS is A CLI toolkit to detect and keep track of Blind XSS\n\ud83d\udcccPantheon-HVNC-V2-Source-leaked\n\ud83d\udcccNeurotoxin - Durable #Backdoors in Federated Learning.\n\ud83d\udcccBitRAT\n\ud83d\udcccS-500 G2-Pro-HVNC-Rat-Source-leaked\n\ud83d\udcccCVE-2021-23017-PoC\n\ud83d\udcccHiveV5 keystream decryptor PoC\n\ud83d\udcccPakistan Taxpayers List\n\ud83d\udcccfoodco.us Leak\n\ud83d\udccc774k USA SCHOOL DETAILS\n\ud83d\udcccPrivFu/PrivilegedOperations.\n\ud83d\udcccTOP 21 Remote Code Execution Exploit\u2019s #RCE\n\ud83d\udcccFrom cookie theft to BEC: Attackers use AiTM phishing sites as entry point to further financial fraud\n\ud83d\udcccRetbleed: Arbitrary Speculative Code Execution with Return Instructions\n\n\n\ud83d\udc49\ud83c\udffb\ud83d\udc49\ud83c\udffb Updates:- https://bit.ly/3yRyah3 \ud83d\udc48\ud83c\udffb\ud83d\udc48\ud83c\udffb", "creation_timestamp": "2022-07-13T11:23:38.000000Z"}